kevinreddot / forshLinks
Shell intended for forwarding-only ssh connection via jumphost
☆10Updated 7 years ago
Alternatives and similar repositories for forsh
Users that are interested in forsh are comparing it to the libraries listed below
Sorting:
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 10 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Updated 9 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Updated last year
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Updated 7 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- ☆25Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Automatic firewall rule orchestator.☆82Updated 8 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Updated 11 months ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Collection of Auditd Examples and Presentations☆88Updated 5 years ago
- Websocket based egress tester☆20Updated 9 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- ☆61Updated 7 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆121Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 11 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago